Demo showcasing Maldev Academy’s code search database
☆41Feb 20, 2024Updated 2 years ago
Alternatives and similar repositories for CodeSearchDemo
Users that are interested in CodeSearchDemo are comparing it to the libraries listed below
Sorting:
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 7 months ago
- An AutoIt obfuscator, written in AutoIt☆13Jul 17, 2020Updated 5 years ago
- proof of concept of user-mode anti-breakpoint technique☆16Sep 15, 2023Updated 2 years ago
- Core Submodule of Exploration C2☆23Jan 27, 2026Updated last month
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- Yandex browser passwords and credit-cards decryption algorithm☆22Apr 8, 2025Updated 10 months ago
- 基于Go和YARA规则 对windows进程和文件进行检测☆19Sep 20, 2024Updated last year
- Cheat Engine-like but MCP☆30Apr 15, 2025Updated 10 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- ☆40Feb 4, 2023Updated 3 years ago
- various python scripts☆16Jun 15, 2021Updated 4 years ago
- ☆44Apr 27, 2024Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Jan 12, 2023Updated 3 years ago
- MemoryBlade Repository: A comprehensive collection of advanced memory hacking techniques, tools, and resources specifically tailored for…☆26Jan 16, 2026Updated last month
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 2 years ago
- Get Function Summaries and more for Ghidra from ChatGPT☆30Dec 6, 2022Updated 3 years ago
- Reverse Shell - technique is commonly used in cyber attacks☆20Mar 2, 2024Updated last year
- Go Dark☆24Nov 23, 2025Updated 3 months ago
- quick and dirty proof-of-concept to hide shells in images☆51Jun 27, 2024Updated last year
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- Gogoanime and Anilist Scrapper free hosting on cloudflare with tutorial.☆14Mar 2, 2025Updated last year
- 基于sqlmap,根据别人的模板自己改进了一些,也有收集了常用的脚本☆19Dec 27, 2019Updated 6 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆323Jan 17, 2024Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆522Nov 18, 2025Updated 3 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Sep 20, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- ☆27Nov 26, 2024Updated last year
- Sniffing files generator☆61Feb 24, 2025Updated last year
- Bypass LSA protection using the BYODLL technique☆171Sep 21, 2024Updated last year
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- Create Anti-Copy DRM Malware☆72Aug 19, 2024Updated last year
- ☆99Feb 1, 2024Updated 2 years ago